IBM warns of critical API Connect auth bypass vulnerability
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容,抓住关键点。 文章主要讲的是IBM敦促客户修补API Connect平台的一个关键漏洞。这个漏洞可以让攻击者绕过认证,远程访问应用。漏洞的编号是CVE-2025-13915,严重性评分9.8/10。影响的版本是10.0.11.0和10.0.8.0到10.0.8.5。 IBM建议升级到最新版本,并提供了缓解措施,比如禁用开发者门户的自助注册。此外,CISA过去四年多次将IBM漏洞加入已知被利用的列表中。 总结的时候要涵盖:IBM、API Connect、认证绕过漏洞、严重性评分、受影响版本、建议升级和缓解措施、CISA的情况。确保在100字以内,语言简洁明了。 </think> IBM敦促客户修复API Connect平台中的认证绕过漏洞(CVE-2025-13915),该漏洞允许攻击者远程访问应用。此高危漏洞影响多个版本,IBM建议升级或采取缓解措施以防止攻击。该漏洞已被美国网络安全机构标记为被积极利用的风险。 2025-12-31 10:45:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:4 收藏

IBM

IBM urged customers to patch a critical authentication bypass vulnerability in its API Connect enterprise platform that could allow attackers to access apps remotely.

API Connect is an application programming interface (API) gateway that enables organizations to develop, test, and manage APIs and provide controlled access to internal services for applications, business partners, and external developers.

Available in on-premises, cloud, or hybrid deployments, API Connect is used by hundreds of companies in banking, healthcare, retail, and telecommunications sectors.

Wiz

Tracked as CVE-2025-13915 and rated 9.8/10 in severity, this authentication bypass security flaw affects IBM API Connect versions 10.0.11.0 and 10.0.8.0 through 10.0.8.5.

Successful exploitation enables unauthenticated threat actors to remotely access exposed applications by circumventing authentication in low-complexity attacks that don't require user interaction.

IBM asked admins to upgrade vulnerable installations to the latest release to block potential attacks and provided mitigation measures for those who can't immediately deploy the security updates.

"IBM API Connect could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application. IBM strongly recommends addressing the vulnerability now by upgrading," the tech giant said. "Customers unable to install the interim fix should disable self-service sign-up on their Developer Portal if enabled, which will help minimise their exposure to this vulnerability."

Detailed instructions for applying the CVE-2025-13915 patch in VMware, OCP, and Kubernetes environments are available in this support document.

Over the past four years, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple IBM security vulnerabilities to its catalog of known exploited vulnerabilities, tagging them as actively abused in the wild and ordering federal agencies to secure their systems, as mandated by Binding Operational Directive (BOD) 22-01.

Two of these security flaws, a code execution flaw in IBM Aspera Faspex (CVE-2022-47986) and an Invalid Input flaw in IBM InfoSphere BigInsights (CVE-2013-3993), have also been flagged by the U.S. cybersecurity agency as exploited in ransomware attacks.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/ibm-warns-of-critical-api-connect-auth-bypass-vulnerability/
如有侵权请联系:admin#unsafe.sh